Steve Dower added the comment:

> So the malicious payload is the whole python command, not just file.bin

Yeah, sorry that wasn't clear. Many vulnerabilities allow attackers to schedule 
process launches (e.g. via cron/Task Scheduler/etc.) without actually being 
able to add any files to the machine - Stuxnet took advantage of this, for 
example. So if Python is already there, you can schedule "python -c "import 
urllib, base64; exec(...)"" to download->decode->exec arbitrary code without 
touching the file system or network with obvious sources.

(Right now, I understand base64 is sufficient encryption, at least until the 
antimalware companies add signatures for base64-encoded scripts. Even then, the 
slightest customization of the original code is going to break base64 enough to 
avoid detection, whereas the signatures are flexible enough to handle 
variations to source code.)

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue26137>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to